Establishment of ad-hoc networks between multiple devices
First Claim
1. A method of configuring an ad-hoc wireless network between an authenticator and a plurality of wireless devices seeking authentication, the method comprising:
- assigning a wireless device as the authenticator;
receiving a first setup message transmitted from a first device seeking authentication to the authenticator;
initiating a first handshake process between the authenticator and the first device seeking authentication;
receiving a second setup message transmitted from a second device seeking authentication to the authenticator, wherein the second setup message is received by the authenticator prior to completion of the first handshake process;
initiating a second handshake process between the authenticator and the second device seeking authentication, wherein the second handshake process is initiated prior to completion of the first handshake process;
completing the first handshake process; and
completing the second handshake process.
7 Assignments
0 Petitions
Accused Products
Abstract
A method of configuring an ad-hoc wireless network between an authenticator and a plurality of wireless devices seeking authentication includes assigning a wireless device as the authenticator and receiving a first setup message transmitted from a first device seeking authentication to the authenticator and initiating a first handshake process between the authenticator and the first device seeking authentication. The method also includes receiving a second setup message transmitted from a second device seeking authentication to the authenticator. The second setup message is received by the authenticator prior to completion of the first handshake process. The method further includes initiating a second handshake process between the authenticator and the second device seeking authentication. The second handshake process is initiated prior to completion of the first handshake process. Moreover, the method includes completing the first handshake process and completing the second handshake process.
-
Citations
62 Claims
-
1. A method of configuring an ad-hoc wireless network between an authenticator and a plurality of wireless devices seeking authentication, the method comprising:
-
assigning a wireless device as the authenticator; receiving a first setup message transmitted from a first device seeking authentication to the authenticator; initiating a first handshake process between the authenticator and the first device seeking authentication; receiving a second setup message transmitted from a second device seeking authentication to the authenticator, wherein the second setup message is received by the authenticator prior to completion of the first handshake process; initiating a second handshake process between the authenticator and the second device seeking authentication, wherein the second handshake process is initiated prior to completion of the first handshake process; completing the first handshake process; and completing the second handshake process. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A wireless device adapted to configure an ad-hoc wireless network between the wireless device and a plurality of wireless devices seeking authentication, the wireless device comprising:
-
a first port adapted to receive a first setup message transmitted from a first device seeking authentication to the wireless device; a first processor adapted to initiate a first handshake process between the wireless device and the first device seeking authentication; a second port adapted to receive a second setup message transmitted from a second device seeking authentication to the wireless device, wherein the second setup message is received by the wireless device prior to completion of the first handshake process; a second processor adapted to initiate a second handshake process between the wireless device and the second device seeking authentication, wherein the second handshake process is initiated prior to completion of the first handshake process; a third processor adapted to complete the first handshake process; and a fourth processor adapted to complete the second handshake process. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A method of establishing an ad-hoc wireless network between a plurality of wireless devices seeking authentication, the method comprising:
-
selecting one wireless device as an authenticator; generating one or more beacons at the authenticator; determining that a timer value is less than a predetermined time; receiving a request from a first device of the plurality of wireless devices seeking authentication; determining that an enrollee count is less than a predetermined maximum value; initiating a first handshake process between the authenticator and the first device; increasing the enrollee count by one; determining that the timer value is less than the predetermined value; receiving a request from a second device of the plurality of wireless devices seeking authentication; determining that the enrollee count is less than the predetermined maximum value; and initiating a second handshake process between the authenticator and the second device. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
-
48. An authentication apparatus selected from a plurality of wireless devices and adapted to establish an ad-hoc wireless network between the authentication apparatus and wireless devices seeking authentication, the authentication apparatus comprising:
-
a first processor adapted to generate one or more beacons; a first decision module adapted to determine that a timer value is less than a predetermined time; a first port adapted to receive a request from a first device of the wireless devices seeking authentication; a second processor adapted to determine that an enrollee count stored in a memory is less than a predetermined maximum value; a third processor adapted to initiate a first handshake process between the authentication apparatus and the first device; a memory controller adapted to increase the enrollee count stored in the memory by one; a second decision module adapted to determine that the timer value is less than the predetermined value; a second port adapted to receive a request from a second device of the wireless devices seeking authentication; a fourth processor adapted to determine that the enrollee count is less than the predetermined maximum value; and a fifth processor adapted to initiate a second handshake process between the authentication apparatus and the second device. - View Dependent Claims (49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62)
-
Specification